proposalbot 3ccfbdc0f0 Changes to mrs_operation-guide from docs/doc-exports#475 (MRS component operatio
Reviewed-by: Kacur, Michal <michal.kacur@t-systems.com>
Co-authored-by: proposalbot <proposalbot@otc-service.com>
Co-committed-by: proposalbot <proposalbot@otc-service.com>
2022-12-09 14:50:38 +00:00

2.0 KiB

original_name

mrs_01_0636.html

Configuring Presto Permissions

MRS 3.x does not enable you to configure Presto permissions.

Configuring Presto Permissions in a Security Cluster

By default, the Hive Catalog authorization of the Presto component is enabled in a security cluster. The Presto permission configuration procedure is as follows:

  1. Log in to Manager. For details, see Accessing FusionInsight Manager (MRS 3.x or Later) <mrs_01_2124>.
  2. Choose System > Manage Role, configure a role that has the Hive database/table permissions, and bind the role to the user.

Configuring Presto Permissions in a Normal Cluster

By default, Presto authorization is not enabled in a normal cluster. You need to manually configure Presto permissions as follows:

  1. Go to the MRS cluster details page.
  2. Choose Components > Hive. Set Type to All. On the displayed Hive configuration page, modify parameter settings.
  3. Search for and modify the following parameters:
    • Set hive.security.authorization.enabled to true.
    • Set hive.security.authorization.manager to org.apache.hadoop.hive.ql.security.authorization.plugin.sqlstd.SQLStdHiveAuthorizerFactory.
  4. Click Save Configuration and select Restart the affected services or instances to restart the Hive service.
  5. Choose Components > Presto. Set Type to All. On the displayed Presto configuration page, modify parameter settings.
  6. Search for and modify the value of hive.security to sql-standard-with-group.
  7. Click Save Configuration and select Restart the affected services or instances to restart the Presto service.
  8. Logging in to MRS Manager
  9. Choose System > Change OMS Database Password > Restart the OMS service.
  10. Choose System > Manage Role, configure a role that has the Hive database/table permissions, and bind the role to the user.